Top 10 spyware tricks of 2005



You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.


Here’s a brief highlight…

10. Spyware spread through Windows Media files
9. Adware companies hide their dirty work using rootkit technology
8. Internet Explorer infected through Firefox
7. Direct Revenue unleashed Aurora
6. Spam bots, keyloggers, kiddie porn connect with major adware companies
5. Spazbox domain installs massive spyware/adware – using IRC
4. Anti-spyware spread by spyware and trojans
3. Direct Revenue adware distributed through BitTorrent
2. AIM worm carries backdoor, rootkit and adware, found to be powered by world wide bot net with ties to the Middle East.
1. Sony BMG infects users with DRM rootkit

What’s distressing is that I’m sure we haven’t seen the last of these tricks… In fact given the traction that some of the rogues have made with #4 above… that may be a favored vector this coming year. I’m sure that we’ll also see other, new tactics.

Earlier this afternoon I did some work for someone that had just recently got a new DSL connection. (And Symantec Internet Security 2006). She had got tons of messenger popup spam. (LAN connection was firewalled, but the PPPoE wasn’t..(?)) Anyway, she was confused about why Symantec would be popping up asking her to download win-fix for $49… So even some of the old vectors are still common. Fortunately she didn’t bite… (and now everything is firewalled and several services are disabled.

Related Posts

Blog Traffic Exchange Related Posts
  • The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
  • How to Remove APCSecure | APCSecure Removal Guide APCSecure is yet another rogue antivirus application from the prolific and annoying wini family of rogues. This particular variant also comes with a rootkit called TDL3. Trojans are used to promote this rogue antivirus and you will likely find that it will create multiple empty files on your computer that......
  • Botnets and spyare "It outta be illegal" is the first thing I usually hear as I start the long process of sanitizing a spyware infested windows machine. The fact is some parts of it ARE, some are just ethically questionable. The area that's against the law is the part that involves tacking control......
Blog Traffic Exchange Related Websites
  • Holiday Spending Guide for a New Economy If you are watching the stock market, listening to the politicians in charge, and reading the popular press, maybe you are starting to build some confidence in our economy. After all, there is nothing wrong with having some optimism during difficult times. The important question is what you do with......
  • Biblical Contradiction: Good works should be seen or hidden: Biblical Contradiction Explained: Good works should be seen or hidden: Good works should be hidden: “Beware of practicing your righteousness before men to be noticed by them; otherwise you have no reward with your Father who is in heaven. Matthew 6:1 Good works should be seen: Let your light shine......
  • The Backswing The swing itself, to a very large degree, is actually a chain reaction if you think about it. When you make one good move, then that is generally going to lead to another good move. If on the other hand you end up making a mistake, then another mistake is......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site